Wednesday, October 16, 2024
HomeCryptocurrency hackWikipedia Page Linked with "Minr" Cryptojacking Malware Infected 3rd Party Website

Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website

Published on

Malware protection

Cryptojacking Malware called Minr infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR).

Wikipedia visitors who visiting the concern page and once a user clicks the link that pointed to the Malware infected website, the malicious script will be executed and visitor infected with “Minr” crypto-jacking malware.

Researchers found that many of the websites are running with an obfusticated script that infected to perform various malicious activities.

- Advertisement - SIEM as a Service

One of the infected site using a malicious HTML code that was generated by the well-known JJEncode obfuscator which is one of the popular for encrypting malicious code.

A few months ago, researchers discovered that  JJEncode obfuscator was once again in use: Minr cryptominer.

Description of the cryptojacking malware

Also, it begins used with many of the websites including web.clod[.]pw and Stati[.]bid.

Once the injected script was deobfuscated and analysis done by the sucuri Security researchers Reveals that malware had begun loading the Minr Malware from   web.stati[.]bid.

Past few years Cryptocurrency mining is a very easy method for cybercriminals to Generating the huge revenue by hijacking the Web- browser and injecting the malicious script and taking control of the CPU Usage from the Victims.

Mining cryptocurrencies in a legitimate way are quite resource consuming process, so attackers demanding ransom payments and infecting other computers to mine the cryptocurrencies.

Also Read:  Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents

Cryptojacking Malware Linked With Wikipedia Page

Recently a Wikipedia page reverting a series of edits that was linked with the 3rd party site which infected with Minr malware.

One of the Wikipedia users Discovered that two serious of Wikipedia Edits was intended to link with malware site and he discussed whether the incident required the attention of Wikipedia administrators.

A Wikipedia User Edit the page about ‘Feminist views on transgender topics” and added a malicious third party link that involved to mining Monero.

This Incident has occurred on February 2nd and the same day  Minr cryptominer used  stati[.]bid the domain was registered.

According to Sucuri, The third-party site happened to be infected with the stati[.]bid malware, and another user who reviewed the edits a few hours later noticed the infection, reverted the changes, contacted the author of the changes and solicited advice in the Wikipedia:Teahouse.

Later it was concluded that there was no intention to linked with infected third party site and the pointed Wikipedia Page.

this type of attack primarily impacts WordPress sites where the obfuscated Minr miner is injected at the very top of the active theme’s header.php file. Sucuri Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

HORUS Protector Delivering AgentTesla, Remcos, Snake, NjRat Malware

The Horus Protector crypter is being used to distribute various malware families, including AgentTesla,...

ErrorFather Hackers Attacking & Control Android Device Remotely

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to...

Hackers Allegedly Selling Data Stolen from Cisco

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The...

Fortigate SSLVPN Vulnerability Exploited in the Wild

A critical vulnerability in Fortinet's FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially...

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware

Recent attacks exploit the Log4j vulnerability (Log4Shell) by sending obfuscated LDAP requests to trigger...

Hackers Abused StackExchange Platform To Deliuver Malicious Python Package

Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a...